AttackVector.tech

Cybersecurity Glossary

Security terms explained two ways — simple analogies anyone can understand, and precise technical definitions for professionals.

52 terms and growing

A
3 terms
B
2 terms
C
8 terms
D
3 terms
F
1 term
I
2 terms
J
1 term
L
1 term
M
1 term
N
1 term
O
2 terms
P
5 terms
R
4 terms
S
9 terms

What is Security Audit?

Think of your digital world like a castle. A security audit is like inviting a very observant friend to walk around, checking every gate,...

Read more

What is Security Misconfiguration?

Think of your computer system like a house filled with treasures you want to keep safe. Security misconfiguration is like leaving your fr...

Read more

What is Sensitive Data Exposure?

Imagine your house is full of valuable things like jewelry and important papers. You keep them safe by locking your doors and windows. Bu...

Read more

What is Server-Side Request Forgery?

Imagine your friend is at a party (the server) and you want to see inside some rooms (internal resources) without being invited. If you c...

Read more

What is Social Engineering?

Think of your secret clubhouse that only lets people in with a special password. Now, imagine if someone wants to get in, but instead of ...

Read more

What is SQL Injection?

Imagine you're at a magic show, and the magician lets you pick a card from a deck. Normally, you'd just choose one card, right? But what ...

Read more

What is Stored XSS?

Think of a community bulletin board where people put up notes. Now, imagine someone sneaks in and posts a note with invisible ink that tu...

Read more

What is Subdomain Enumeration?

Think of a website like a big house. Everyone sees the front door, but there are also side doors and back doors that aren't as obvious. S...

Read more

What is Supply Chain Attack?

Think about building a treehouse using materials from different stores. You expect the wood, nails, and tools to be safe and reliable. Bu...

Read more
T
3 terms
V
1 term
W
2 terms
X
1 term
Z
2 terms